This course is taught by certified instructors using the official CEH V9 courseware.
The Certified Ethical Hacker course through CyberSecurity Academy will help you to stop hackers by learning to think like one. This class immerses students in an interactive environment where they will scan, test, hack, and secure their own systems. CEH candidates will learn how intruders escalate privileges and what steps can be taken to secure a system. Also covered will be Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. All students will leave the class with a detailed plan on conducting vulnerability assessments and penetration tests.
Arguably the CEH is the most popular information security related certification today, and is part of the DoD 8570 Directive.
Who Should Attend:
- Computer Forensics/Digital Forensics Professionals
- Incident Response Personnel
- Information Security Professionals
- IT Managers
- Law Enforcement Personnel
- Legal Professionals
- Network Administrators and Architects
- System Administrators
The CEH 312-50 exam will be conducted on the last day of training. Students need to pass the online Prometric exam to receive the CEH certification. The certification test is included in your tuition, and you will receive access to CyberSecurity Academy's certification test preparation materials after enrolling at no additional cost.
Course Topics Include:
- Ethical Hacking Methodology
- Footprinting and Reconnaissance
- Scanning Networks
- System Hacking
- Trojans and Backdoors
- Viruses and Worms
- Social Engineering
- Denial of Service
- Session Hijacking
- Hacking Webservers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Evading IDS, Firewalls and Honeypots
- Buffer Overflows
- Penetration Testing
Save This Event
When & Where
One Thing, Done Well.
Some pretty big corporations and government agencies rely on us. You should too.
We only do one thing at CyberSecurity Academy. Instruct professionals to develop their skills as digital forensic examiners and information security professionals.
We don't offer dozens of courses. We offer a few that we are really good at, such as the Certified Ethical Hacker, Certified Hacking Forensic Investigator, and EC-Council Certified Incident Handler. Your instructors are not only professional trainers, but digital forensic and information security professionals that perform incident response and process digital forensic cases on a regular basis. Meet our instructors and decide who you would want to take your training from.
There are professionals and then there are CSA trained professionals. You would take your training elsewhere why?